Elastic Security Rules with Custom Windows Logs: Using xml2evtx and WinlogbeatBuild and test Elastic Security rules with tools like xml2evtx and WinlogbeatNov 9, 2024Nov 9, 2024
The Value of Attack EmulationDiscover the value of attack emulation in cybersecurity.Nov 3, 2024Nov 3, 2024
Optimizing Windows Security Audit SettingsLearn how to enhance cybersecurity with native Windows logging.Oct 12, 2024Oct 12, 2024
Deploying Elastic Stack with FortiDragon’s Custom Logstash Pipelines on a Single Node Using AnsibleDeploy Elastic Stack on a single node using Ansible with custom Logstash configurations by FortiDragon for enhanced data processing.Sep 29, 2024Sep 29, 2024
Setup Elasticsearch Cluster with Custom FortiGate Log CollectorLearn how to set up an Elasticsearch cluster with secure communication, Metricbeat, Filebeat, Fleet Server, and centralized log collection.Sep 15, 2024Sep 15, 2024
Elastic Stack with Docker ComposeA journey from network engineering to cybersecurity, exploring how to build and secure an Elastic Stack using Docker Compose.Sep 1, 2024Sep 1, 2024
[pfSense] Security zones interface design conceptSecurity Zones Interface conceptOct 2, 2021Oct 2, 2021